mirror of
				https://github.com/sqlmapproject/sqlmap.git
				synced 2025-11-04 09:57:38 +03:00 
			
		
		
		
	Trivial cosmetics (breaking help into two lines)
This commit is contained in:
		
							parent
							
								
									98ac1cf9c1
								
							
						
					
					
						commit
						40e4422bbd
					
				| 
						 | 
				
			
			@ -18,7 +18,7 @@ from lib.core.enums import OS
 | 
			
		|||
from thirdparty.six import unichr as _unichr
 | 
			
		||||
 | 
			
		||||
# sqlmap version (<major>.<minor>.<month>.<monthly commit>)
 | 
			
		||||
VERSION = "1.5.3.11"
 | 
			
		||||
VERSION = "1.5.3.12"
 | 
			
		||||
TYPE = "dev" if VERSION.count('.') > 2 and VERSION.split('.')[-1] != '0' else "stable"
 | 
			
		||||
TYPE_COLORS = {"dev": 33, "stable": 90, "pip": 34}
 | 
			
		||||
VERSION_STRING = "sqlmap/%s#%s" % ('.'.join(VERSION.split('.')[:-1]) if VERSION.count('.') > 2 and VERSION.split('.')[-1] == '0' else VERSION, TYPE)
 | 
			
		||||
| 
						 | 
				
			
			
 | 
			
		|||
| 
						 | 
				
			
			@ -704,7 +704,7 @@ def cmdLineParser(argv=None):
 | 
			
		|||
            help="Regexp for filtering targets")
 | 
			
		||||
 | 
			
		||||
        general.add_argument("--skip-heuristics", dest="skipHeuristics", action="store_true",
 | 
			
		||||
            help="Skip heuristic detection of SQLi/XSS/FI vulnerabilities")
 | 
			
		||||
            help="Skip heuristic detection of vulnerabilities")
 | 
			
		||||
 | 
			
		||||
        general.add_argument("--skip-waf", dest="skipWaf", action="store_true",
 | 
			
		||||
            help="Skip heuristic detection of WAF/IPS protection")
 | 
			
		||||
| 
						 | 
				
			
			@ -731,7 +731,7 @@ def cmdLineParser(argv=None):
 | 
			
		|||
            help="Run host OS command(s) when SQL injection is found")
 | 
			
		||||
 | 
			
		||||
        miscellaneous.add_argument("--beep", dest="beep", action="store_true",
 | 
			
		||||
            help="Beep on question and/or when SQLi/XSS/FI is found")
 | 
			
		||||
            help="Beep on question and/or when vulnerability is found")
 | 
			
		||||
 | 
			
		||||
        miscellaneous.add_argument("--dependencies", dest="dependencies", action="store_true",
 | 
			
		||||
            help="Check for missing (optional) sqlmap dependencies")
 | 
			
		||||
| 
						 | 
				
			
			
 | 
			
		|||
		Loading…
	
		Reference in New Issue
	
	Block a user